CN110659580A - Method and device for quickly authenticating identity information - Google Patents

Method and device for quickly authenticating identity information Download PDF

Info

Publication number
CN110659580A
CN110659580A CN201910807869.XA CN201910807869A CN110659580A CN 110659580 A CN110659580 A CN 110659580A CN 201910807869 A CN201910807869 A CN 201910807869A CN 110659580 A CN110659580 A CN 110659580A
Authority
CN
China
Prior art keywords
identity information
target
user terminal
information
information database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910807869.XA
Other languages
Chinese (zh)
Inventor
刘新
黄庆财
王玉平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Xinsi Blockchain Technology Co Ltd
Original Assignee
Shenzhen Xinsi Blockchain Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Xinsi Blockchain Technology Co Ltd filed Critical Shenzhen Xinsi Blockchain Technology Co Ltd
Priority to CN201910807869.XA priority Critical patent/CN110659580A/en
Publication of CN110659580A publication Critical patent/CN110659580A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/51Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/58Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/583Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/58Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/587Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using geographical or spatial information, e.g. location
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/94Hardware or software architectures specially adapted for image or video understanding

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Library & Information Science (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Human Computer Interaction (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The application discloses a user identity information authentication method and device. The method comprises the following steps: acquiring characteristic information of a target user terminal through mobile equipment carried by the target user terminal; determining a target characteristic information set according to the characteristic information of the target user terminal; determining a target crowd identity information database corresponding to the target characteristic information set in an identity information database; and acquiring to-be-authenticated identity information of the target user terminal, detecting whether target identity information matched with the to-be-authenticated identity information exists in the target population identity information database, and if so, determining that identity information authentication is successful. The embodiment of the application can improve the authentication speed of the identity information.

Description

Method and device for quickly authenticating identity information
Technical Field
The present application relates to the field of identity authentication technologies, and in particular, to a method and an apparatus for fast identity information authentication.
Background
In daily life of people, there are many occasions where identity authentication needs to be performed on a user, for example, when the user uses a stored value card or a credit card for consumption, the identity of the user needs to be verified, wherein the user can consume through an e-commerce website on the internet, and can also consume in goods sales places (such as shopping malls, supermarkets and the like); when a user logs in a website on the Internet, the identity of the user needs to be verified; when entering a specific area or a specific place, a user needs to verify the identity of the user, such as entrance guard equipment of some places.
Face recognition is a biometric technology for identity recognition based on facial feature information of a person. A series of related technologies, also commonly called face recognition and face recognition, are used to collect images or video streams containing faces by using a camera or a video camera, automatically detect and track the faces in the images, and then perform face recognition on the detected faces. The identity information is authenticated through the face recognition technology, namely, whether the identity information is the person is judged by recognizing the face features and matching the face features with the feature information in the face library. In life, methods for authenticating identity information through face recognition have application in many fields, such as certificate handling, user identity authentication through face recognition, and payment and transaction through face recognition and authentication of user identity information.
However, under the background of a huge population base, if the number of face templates in the face library is very large, it is very difficult to quickly identify the identity of a person from the face library during face identification, which takes a long time, resulting in a very slow face identification speed.
Disclosure of Invention
The application provides a user identity information authentication method and device, which are used for improving the identity information authentication speed.
In a first aspect, a method for authenticating user identity information is provided, including: acquiring characteristic information of the target user terminal; determining a target characteristic information set according to the characteristic information of the target user terminal; determining a target crowd identity information database corresponding to the target characteristic information set in an identity information database; and acquiring to-be-authenticated identity information of the target user terminal, detecting whether target identity information matched with the to-be-authenticated identity information exists in the target population identity information database, and if so, determining that identity information authentication is successful.
In one possible implementation manner, the feature information of the target user terminal includes location information of the target user terminal; the determining a target feature information set according to the feature information of the target user terminal includes: determining a historical movement track of the target user terminal according to the position information of the target user terminal, and determining a target characteristic information set containing the historical movement track, wherein the historical movement track is a movement track from the beginning of movement to the current position of the target user terminal.
In another possible implementation manner, the target feature information set includes current location information and a current time point of the target client terminal, historical location information and a corresponding historical time point, and a vehicle used in history, where the historical location information is location information on the historical movement track of the target user terminal, the historical time point is a time point when the target user terminal moves to a corresponding historical location, and the historical vehicle is a vehicle used by the target user terminal on the historical movement track.
In yet another possible implementation manner, the determining a target population identity information database corresponding to the target feature information set in the identity information database includes: according to the obtained target characteristic information set, determining target population identity information containing the target characteristic information set from an identity information database, and classifying the determined target population identity information into a target population identity information database, wherein the identity information database is a database for storing identity information, and the target population identity information database is a database for storing the identity information of a target population containing the target characteristic information set.
In another possible implementation manner, the identity information database includes a face information database, and before determining a target group identity information database corresponding to the target feature information set in the identity information database, the method further includes: and a face identity information acquisition point exists on the historical movement track, target face information of the target user terminal is acquired at the face identity information acquisition point, and the target face information is input into the identity information database, wherein the face identity information acquisition point is a position with a function of acquiring the face identity information on the historical movement track.
In yet another possible implementation manner, before the detecting whether there is target identity information matching the identity information to be recognized in the target population identity information database, the method further includes: and caching the identity information into the target population identity information database in real time in advance.
In yet another possible implementation manner, the determining of the historically used vehicles based on the current location information and the current time point of the target client terminal, the historical location information and the corresponding historical time point includes: calculating the difference value of the two corresponding historical time points according to the two historical positions on the historical movement track and the two corresponding historical time points to obtain the movement time of the target user terminal between the two historical positions and obtain the geographic distance between the two historical positions; obtaining the moving speed of the target user terminal between the two historical positions according to the geographical distance between the two historical positions and the moving time; and judging the vehicle used by the target user terminal to move between the two historical positions according to the moving speed.
In a second aspect, there is provided a user identity information authentication apparatus, including: the first acquisition unit is used for acquiring the characteristic information of the target user terminal; a determining unit, configured to determine a target feature information set according to the feature information of the target user terminal; the determining unit is further configured to determine a target crowd identity information database corresponding to the target feature information set in an identity information database; the second acquisition unit is used for acquiring the identity information to be authenticated of the target user terminal; the detection unit is used for detecting whether target identity information matched with the identity information to be authenticated exists in the target crowd identity information database or not; the determining unit is further configured to determine that the identity information authentication is successful when the detecting unit detects that the target identity information matched with the identity information to be authenticated exists in the target crowd identity information database.
Further, the feature information of the target user terminal includes location information of the target user terminal; the determining unit determines a target characteristic information set according to the characteristic information of the target user terminal, specifically: and determining the historical movement track of the target user terminal according to the position information of the target user terminal, and determining a target characteristic information set containing the historical movement track.
Further, the target feature information set includes current position information and a current time point of the target client terminal, historical position information and a corresponding historical time point, and a historical use vehicle.
Further, the determining unit determines a target population identity information database corresponding to the target feature information set in an identity information database, specifically: determining target crowd identity information containing the target characteristic information set from an identity information database; and the target crowd identity information is put into a target crowd identity information database.
Furthermore, the identity information database comprises a face information database, and the device further comprises a collecting and inputting unit;
the acquisition and input unit is used for acquiring the target face information of the target user terminal at a face identity information acquisition point before the determination unit determines the target crowd identity information database corresponding to the target feature information set in the identity information database, and inputting the target face information into the identity information database.
Further, the device also comprises a cache unit;
the cache unit is used for caching the identity information into the target crowd identity information database in real time in advance before the detection unit detects whether the target crowd identity information matched with the identity information to be identified exists in the target crowd identity information database.
Further, the historically used vehicles are determined based on the current location information and the current point in time of the target client terminal, historical location information and corresponding historical point in time.
In a third aspect, an electronic device is provided, including: comprises a processor and a memory; the processor is configured to support the apparatus to perform corresponding functions in the method of the first aspect and any possible implementation manner thereof. The memory is used for coupling with the processor and holds the programs (instructions) and data necessary for the device. Optionally, the apparatus may further comprise an input/output interface for supporting communication between the apparatus and other apparatuses.
In a fourth aspect, there is provided a computer-readable storage medium having stored therein instructions, which, when run on a computer, cause the computer to perform the method of the first aspect and any possible implementation thereof.
In a fifth aspect, there is provided a computer program product containing instructions which, when run on a computer, cause the computer to perform the method of the first aspect and any of its possible implementations.
The method comprises the steps of determining a target characteristic information set according to characteristic information of a target user, and determining a target crowd identity information database from an identity information database according to the target characteristic information set; when the identity information of the target user is authenticated, the identity information to be verified of the target user is matched with the data in the target population identity information database, so that the size of the identity information database for matching is reduced, and the identity information authentication speed is increased.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments or the background art of the present application, the drawings required to be used in the embodiments or the background art of the present application will be described below.
Fig. 1 is a schematic flowchart of a method for authenticating user identity information according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of another user identity information authentication method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another user identity information authentication method according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a user identity information authentication apparatus according to an embodiment of the present application;
fig. 5 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," and the like in the description and claims of the present application and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
In order to more clearly illustrate the technical solutions in the embodiments or the background art of the present application, the drawings required to be used in the embodiments or the background art of the present application will be described below.
The embodiments of the present application will be described below with reference to the drawings.
Referring to fig. 1, fig. 1 is a schematic flowchart illustrating a method for authenticating user identity information according to an embodiment of the present disclosure.
101. And acquiring the characteristic information of the target user terminal.
The target user terminal is a mobile device (e.g., a mobile phone, a tablet computer, etc.) carried by the target user. The target user refers to a user whose identity is to be authenticated. The characteristic information refers to a series of attributes that the target user has. According to different situations, different feature information can be set, and the feature information is not necessarily unique, and is not necessarily single, for example: the gender of the target user terminal, or the gender and the current location of the target user terminal. The acquired characteristic information of the target user terminal is used as a limit, and the scale of the identity information data for comparison is preliminarily reduced in the huge identity information data, so that a faster authentication speed can be provided in the subsequent identity information authentication process.
102. And determining a target characteristic information set according to the characteristic information of the target user terminal.
The target feature information set is a set of associated feature information determined by feature information of the target user terminal. It should be noted that the set of associated feature information determined by the feature information of the target user terminal may be a set of target feature information in which all directly obtained feature information is used, or other feature information derived by analysis according to directly obtained feature information is used as a set of target feature information, or a set of target feature information in which directly obtained feature information and derived other feature information are used together; and determining other associated characteristic information on the basis of the acquired characteristic information of the target user terminal, and classifying the characteristic information into a set to obtain a target characteristic information set. Similarly, the target feature information set can be customized according to different practical situations. And further reducing the scale of the identity information data for comparison by determining the target characteristic information set.
103. And determining a target crowd identity information database corresponding to the target characteristic information set in the identity information database.
The identity information data is stored in an identity information database. All the collected identity information is input into the identity information database, so that the identity information of the target user to be authenticated is directly matched in the identity information database to achieve the aim of authenticating the identity information, and the method is very slow. And according to the determined target characteristic information set, selecting the identity information which has a corresponding relation with the target characteristic information set from the identity information in the identity database, and classifying the selected identity information into the target population identity information database to serve as identity information data for matching and authenticating the identity information of the target user. It should be noted that the corresponding relationship between the identity information in the target population identity information database and the target feature information set may be customized according to actual needs, and is not necessarily unique.
104. And acquiring to-be-authenticated identity information of the target user terminal, detecting whether target identity information matched with the to-be-authenticated identity information exists in the target crowd identity information database, and if so, determining that identity information authentication is successful.
And the identity information to be authenticated of the target user terminal is the identity information which is not authenticated by the target user terminal. After the target crowd identity information database is determined, the identity information to be authenticated of the target user terminal is input under the condition that the identity information authentication of the target user terminal is required. Then, whether target identity information matched with the identity information to be authenticated of the target user terminal exists in the target population identity information database is detected, and if yes, the identity information of the target user terminal is determined to be authenticated successfully; and if not, determining that the authentication of the identity information of the target user terminal fails.
The method comprises the steps of determining a target characteristic information set according to characteristic information of a target user, and determining a target crowd identity information database from an identity information database according to the target characteristic information set; when the identity information of the target user is authenticated, the identity information to be verified of the target user is matched with the data in the target population identity information database instead of being directly matched with the data in the identity information database, so that the size of the identity information database for matching is reduced, and the identity information authentication speed is increased.
Referring to fig. 2, fig. 2 is a schematic flowchart illustrating another method for authenticating user identity information according to an embodiment of the present application.
201. And acquiring the position information of the target user terminal.
The location information of the target user terminal is acquired through a Global Positioning System (GPS). And in the moving process of the target user terminal, acquiring the position information of the target user terminal in real time.
202. And determining the historical movement track of the target user terminal according to the position information of the target user terminal.
The historical movement track is the track moved by the target user terminal from the beginning of recording the movement of the target user terminal to the end of identity information authentication. And recording all the position information through the position information of the target user acquired in real time to obtain the historical movement track of the target user terminal. It should be noted that the historical movement track of the target user terminal may be a track of the entire movement process of the target user terminal, or may be a partial movement track of the entire movement track.
203. And collecting the face identity information at a face information collecting point.
In this embodiment, the identity information is face identity information, and the face identity information refers to face feature information of a person capable of confirming the identity. The face information acquisition point refers to a device with a function of acquiring face identity information, or a geographical position with the device, such as a gas station camera, an airport security inspection entrance and the like. And a face information acquisition point exists in the historical movement track of the target user terminal, face identity information is acquired at the face information acquisition point, and the information is used as information for comparing with the target user terminal and further authenticating the identity information to be verified of the target user terminal.
204. And inputting the face identity information into an identity information database.
And inputting the face identity information acquired at the face information acquisition point into an identity information database.
It can be understood that the face identity information stored in the identity information database should be all face identity information collected by the face information collection point.
205. And determining the target crowd identity information database containing the historical movement track in the identity information database.
After the identity information database containing the face identity information is obtained, the face identity information in the identity information database is very huge, so that the target crowd identity information database with a smaller range needs to be determined according to the historical movement track of the target user terminal. In the identity information database, retrieving the face identity information of the target crowd, of which the moving number track comprises the historical moving track of the target user terminal, and putting the retrieved face identity information of the target crowd into the identity information database of the target crowd, wherein the data in the identity information database of the target crowd is only the face identity information of the target crowd. It should be noted that the historical movement track including the target user terminal means that there is a historical movement track passing through the target user terminal during the movement process.
206 pre-caching the identity information into the target population identity information database in real time.
The method comprises the steps of retrieving face identity information containing historical movement tracks of target users from an identity information database, caching the retrieved face identity information of the target people while retrieving, inputting the retrieved face identity information into a target people identity information database, caching the face identity information of the target people needing to be compared to the target people identity information database before authenticating the identity information of a target user terminal, and when identity authentication is suddenly carried out on a target user terminal, temporarily obtaining the identity information of the target people after receiving an instruction is not needed, so that the authentication speed is greatly improved. For example: for the target user terminal A, after the position information and the movement track of the A are obtained, the face information of the target crowd of which the movement track comprises the movement track of the A is cached in the target crowd identity information database in real time in advance. When the identity authentication of the A is needed, the subsequent authentication operation can be directly carried out from the cached identity information database of the target crowd.
207. And acquiring the identity information to be authenticated of the target user terminal.
The identity information to be authenticated of the target user terminal obtained in this embodiment is face information to be authenticated of the target user terminal. When the identity authentication is performed on the target user terminal, the face information to be authenticated of the target user terminal is input through a camera of an intelligent terminal (such as a mobile phone, a tablet personal computer and the like) and is remotely input through a mobile internet.
208. And detecting whether target identity information matched with the identity information to be authenticated exists in the target population identity information database, and if so, determining that the identity information authentication is successful.
Detecting whether target face identity information matched with identity information to be authenticated of a target user terminal exists in a target population identity information database, and if so, determining that the identity information authentication of the target user terminal is successful; and if not, determining that the authentication of the identity information of the target user terminal fails.
In the embodiment, the position information of the target user terminal is obtained to obtain the historical movement track of the target user terminal, then the target population identity information database containing the historical movement track of the target user terminal is determined from the identity information database, after the face identity information to be authenticated of the target user terminal is obtained, whether the target face identity information matched with the face identity information to be authenticated of the target user terminal exists in the target population identity information database is detected, and if the target face identity information exists, the identity information authentication is successful. The face identity information to be verified of the target user is matched with the data in the target population identity information database, but not directly matched with the data in the identity information database, so that the size of the identity information database for matching is reduced, and the identity information authentication speed is increased.
Referring to fig. 3, fig. 3 is a schematic flowchart illustrating another method for authenticating user identity information according to an embodiment of the present application.
301. And acquiring the position information of the target user terminal.
The location information of the target user terminal is acquired through a Global Positioning System (GPS). And in the moving process of the target user terminal, acquiring the position information of the target user terminal in real time.
302. And determining the current position information and the current time point of the target user terminal, the historical position information and the corresponding historical time point of the target user terminal, and the historical used transportation according to the position information of the target user terminal.
The current position refers to the position of the target user terminal when identity information authentication is carried out, the historical position refers to the position on the historical movement track of the target user terminal, and the historically used transportation means refers to the used transportation means on the historical movement track of the target user terminal. And when the position information of the target user terminal is acquired in real time, recording the corresponding time point at the same time. Recording current position information and a current time point of a target user terminal, then determining historical position information and a corresponding historical time point, obtaining a geographical distance between a selected historical position and the current position of the target user terminal according to a historical movement track, obtaining a time of passing through the selected historical movement track according to a difference value between the selected historical time point corresponding to the historical position and the current time point, obtaining a movement speed of the target user terminal on the selected historical movement track according to the geographical distance between the selected historical movement tracks and the time of passing through the historical movement track, and analyzing a transportation tool used by the selected historical movement track according to a set speed interval of the movement speed, wherein the transportation tool comprises: and if the moving speed is 10 kilometers per hour to 20 kilometers per hour, judging that the used vehicle is a bicycle.
It should be noted that the selected historical movement track is not necessarily unique, and when only one historical position is selected, only the historical movement track from the selected historical position to the current position is selected; and when a plurality of historical positions are selected, respectively counting every two historical positions and the historical movement track between the last historical position and the current position according to the time sequence of the target user terminal reaching the historical positions.
Determining a population having the same characteristics according to the characteristics of the target user terminal, wherein the characteristics are represented as: using the same vehicle, it takes the same time to stay at the same location at the same time. For example, for target user terminal B, assume that B is currently located in an unmanned store in the Nanshan region of Shenzhen City, and the current point in time is 9 hours and 5 minutes in the morning. The selected historical position is the public service parking lot of the south mountain science and technology park, the time point when the vehicle arrives at the public service parking lot is 8 am, the situation that the vehicle arrives at the public service parking lot of the south mountain science and technology park from the dragon hillock at 8 am can be seen according to the historical movement track of the vehicle B, 1 hour is consumed, and 5 minutes is consumed from the public service parking lot to the unmanned store. Assuming that the distance from the dragon sentry to the public service parking lot is 30 kilometers and the range from the public service parking lot to the unmanned store is 500 meters, the speed from the dragon sentry to the public service parking lot is 30 kilometers per hour, the speed from the public service parking lot to the unmanned store is 6 kilometers per hour, and then the fact that the dragon sentry is driven to the public service parking lot, the public service parking lot walks to the unmanned store, and finally the time of staying in the unmanned store is 9 o' clock 05 minutes is determined, so that the target characteristic information set of the B can be obtained as follows: and 8 points of driving from the dragon hillock to the Nanshan science and technology park public service parking lot take 1 hour, 9 points of walking from the public service parking lot to the unmanned store take 5 minutes, and the unmanned store stays at 9 points 05 minutes.
303. And collecting the face identity information at a face information collecting point.
For the above example, for the specific implementation of step 303, with reference to the related description of embodiment 203, when B arrives at the public welfare parking lot, the target user terminal B may perform face information acquisition and confirmation in the public welfare parking lot, and acquire face identity information in the identity information database by performing face information acquisition and confirmation in the public welfare parking lot.
304. And inputting the face identity information into a face identity information database.
The specific implementation of step 304 may refer to the related description of embodiment 204, and for the above example, after the public service parking lot acquires the face identity information, the acquired face identity information is entered into the face identity information database through the internet, where it should be noted that the face identity information database includes all the face identity information acquired in the public service parking lot.
305. And determining the target crowd face identity information database containing the historical movement track in the face identity information database.
The specific implementation of step 305 may refer to the related description of the foregoing embodiment 205, and for the foregoing example, according to the target feature information set determined by B: and 8 points of driving from the dragon hillock to the Nanshan science and technology park public service parking lot take 1 hour, 9 points of walking from the public service parking lot to the unmanned store take 5 minutes, and the unmanned store stays at 9 points 05 minutes. And retrieving the face identity information containing the target characteristic information set from the face identity information database, and inputting the face identity information into the target face identity information database.
306. And caching the face identity information into the face identity information database of the target population in real time in advance.
The specific implementation of step 306 may refer to the related description of embodiment 206, and for the above example, after retrieving the face identity information of the feature information set including B from the face identity information database, while retrieving, caching the retrieved face identity information of the target group, and entering into the target group identity information database, and before authenticating the identity information of the target user terminal, caching the face identity information of the target group to be compared into the target group identity information database in advance.
307. And acquiring the identity information of the face to be authenticated of the target user terminal.
For the above example, when B purchases in an unmanned store and selects face payment, identity information needs to be authenticated, and the face identity information of B is acquired through a mobile phone camera, that is, the face identity information of B to be authenticated is obtained.
308. And detecting whether target face identity information matched with the face identity information to be authenticated exists in the target population face identity information database, and if so, determining that the identity information authentication is successful.
The specific implementation of step 308 may refer to the related description of embodiment 208, and for the above example, it is detected whether target human face identity information matching with the human face identity information of B exists in the target population identity information database, and if yes, it is determined that the identity information of B is successfully authenticated; and if not, determining that the identity information authentication of the B fails.
The embodiment obtains the current position information, the current time point, the historical time point and the corresponding historical time point of the target user terminal by obtaining the position information of the target user terminal, then obtains the time spent by the target user terminal moving on the historical moving track and the adopted transportation means by analyzing and calculating, uses the same transportation means, consumes the same time, stays at the same position at the same time as a target characteristic information set to determine a target crowd face identity information database from a face identity information database, detects whether target face identity information matched with the face identity information to be authenticated of the target user terminal exists in the target crowd face identity information database after obtaining the face identity information to be authenticated of the target user terminal, and if the target face identity information exists, indicates that the identity information authentication is successful. The face identity information to be authenticated is matched with the face identity information data in the face identity information database of the target population, but is not directly matched with the data in the identity information database, so that the size of the identity information database for matching is reduced, and the identity information authentication speed is increased.
The method of the embodiments of the present application is set forth above in detail and the apparatus of the embodiments of the present application is provided below.
Referring to fig. 4, fig. 4 is a schematic structural diagram of a device for authenticating user identity information according to an embodiment of the present application, where the device 400 includes: a first acquisition unit 401, a second acquisition unit 402, a detection unit 403, and a determination unit 404. Wherein:
a first obtaining unit 401, configured to obtain feature information of a target user terminal;
a determining unit 404, configured to determine a target feature information set according to the feature information of the target user terminal;
the determining unit 404 is further configured to determine a target group identity information database corresponding to the target feature information set in an identity information database;
a second obtaining unit 402, configured to obtain identity information to be authenticated of the target user terminal;
a detecting unit 403, configured to detect whether target identity information matching the identity information to be authenticated exists in the target population identity information database;
the determining unit 404 is further configured to determine that the identity information is successfully authenticated when the detecting unit detects that the target identity information matching the identity information to be authenticated exists in the target population identity information database.
Further, the feature information of the target user terminal includes location information of the target user terminal; the determining unit 404 determines a target feature information set according to the feature information of the target user terminal, specifically: and determining the historical movement track of the target user terminal according to the position information of the target user terminal, and determining a target characteristic information set containing the historical movement track.
Further, the target feature information set includes current position information and a current time point of the target client terminal, historical position information and a corresponding historical time point, and a historical use vehicle.
Further, the determining unit 404 determines a target group identity information database corresponding to the target feature information set in the identity information database, specifically: determining target crowd identity information containing the target characteristic information set from an identity information database; and the target crowd identity information is put into a target crowd identity information database.
Further, the identity information database comprises a face information database, and the apparatus 400 further comprises an acquisition and entry unit 405;
the acquisition and entry unit 405 is configured to acquire target face information of the target user terminal at a face identity information acquisition point before the determination unit 404 determines the target crowd identity information database corresponding to the target feature information set in the identity information database, and enter the target face information into the identity information database.
Further, the apparatus 400 further includes a cache unit 406;
the caching unit 406 is configured to cache the identity information in the target population identity information database in real time in advance before the detecting unit 403 detects whether there is target identity information matching the identity information to be recognized in the target population identity information database.
Further, the historically used vehicles are determined based on the current location information and the current point in time of the target client terminal, historical location information and corresponding historical point in time.
In this embodiment, a target characteristic information set is obtained by determining characteristic information of a target user terminal, then a target population identity information database corresponding to the target characteristic information set is determined from an identity information database, after identity information to be authenticated of the target user terminal is obtained, whether target identity information matched with the identity information to be authenticated of the target user terminal exists in the target population identity information database is detected, and if yes, identity information authentication is successful. When the identity information of the target user is authenticated, the identity information to be verified of the target user is matched with the data in the target population identity information database instead of being directly matched with the data in the identity information database, so that the size of the identity information database for matching is reduced, and the identity information authentication speed is increased.
Fig. 5 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present application. The apparatus 500 includes a processor 501 and may also include an input device 502, an output device 503, and a memory 504. The input device 502, the output device 503, the memory 504, and the processor 501 are connected to each other via a bus.
The memory 504 includes, but is not limited to, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM), or a portable read-only memory (CD-ROM), and the memory 504 is used for related instructions and data.
Input means 502 are for inputting data and/or signals and output means 503 are for outputting data and/or signals. The output device 502 and the input device 503 may be separate devices or may be an integral device.
The processor 501 may include one or more processors, for example, one or more Central Processing Units (CPUs), and in the case that the processor 501 is one CPU, the CPU may be a single-core CPU or a multi-core CPU.
The memory 504 is used to store program codes and data for the network devices.
The processor 501 is used for calling the program codes and data in the memory and executing the following steps:
in one implementation, the processor 501 is configured to perform the following steps: acquiring characteristic information of the target user terminal; determining a target characteristic information set according to the characteristic information of the target user terminal; determining a target crowd identity information database corresponding to the target characteristic information set in an identity information database; and acquiring to-be-authenticated identity information of the target user terminal, detecting whether target identity information matched with the to-be-authenticated identity information exists in the target population identity information database, and if so, determining that identity information authentication is successful. When the identity information of the target user is authenticated, the identity information to be verified of the target user is matched with the data in the target population identity information database instead of being directly matched with the data in the identity information database, so that the size of the identity information database for matching is reduced, and the identity information authentication speed is increased.
Optionally, the processor 501 is further configured to call the program code and data in the memory 504 to perform the steps in the method implementation shown in fig. 1 to 3.
It will be appreciated that fig. 5 only shows a simplified design of an electronic device. In practical applications, the electronic devices may further include necessary other components, including but not limited to any number of input/output devices, processors, controllers, memories, etc., and all electronic devices that can implement the user identity information authentication apparatus of the embodiments of the present application are within the scope of the present application.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in or transmitted over a computer-readable storage medium. The computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)), or wirelessly (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a Digital Versatile Disk (DVD)), or a semiconductor medium (e.g., a Solid State Disk (SSD)), among others.
One of ordinary skill in the art will appreciate that all or part of the processes in the methods of the above embodiments may be implemented by hardware related to instructions of a computer program, which may be stored in a computer-readable storage medium, and when executed, may include the processes of the above method embodiments. And the aforementioned storage medium includes: various media that can store program codes, such as a read-only memory (ROM) or a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The foregoing detailed description of the embodiments of the present application has been presented to illustrate the principles and implementations of the present application, and the above description of the embodiments is only provided to help understand the method and the core concept of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. An authentication method of identity information, comprising:
acquiring characteristic information of a target user terminal;
determining a target characteristic information set according to the characteristic information of the target user terminal;
determining a target crowd identity information database corresponding to the target characteristic information set in an identity information database;
and acquiring to-be-authenticated identity information of the target user terminal, detecting whether target identity information matched with the to-be-authenticated identity information exists in the target population identity information database, and if so, determining that identity information authentication is successful.
2. The method of claim 1, wherein the feature information of the target ue comprises location information of the target ue;
the determining a target feature information set according to the feature information of the target user terminal includes:
and determining the historical movement track of the target user terminal according to the position information of the target user terminal, and determining a target characteristic information set containing the historical movement track.
3. The method of claim 1, wherein the target characteristic information set comprises current location information and a current point in time of the target client terminal, historical location information and a corresponding historical point in time, and historical vehicles in use.
4. The method of claim 1, wherein determining a target population identity information database in the identity information database corresponding to the target feature information set comprises:
determining target crowd identity information containing the target characteristic information set from an identity information database;
and the target crowd identity information is put into a target crowd identity information database.
5. The method of any one of claims 2 to 4, wherein the identity information database comprises a face information database, and before determining a target population identity information database corresponding to the target feature information set in the identity information database, the method further comprises:
and acquiring target face information of the target user terminal at a face identity information acquisition point, and inputting the target face information into the identity information database.
6. The method according to any one of claims 1 to 5, wherein before the detecting whether the target identity information matching the identity information to be recognized exists in the target population identity information database, the method further comprises:
and caching the identity information into the target population identity information database in real time in advance.
7. The method of claim 3, wherein the historically used vehicles are determined based on current location information and a current point in time of the target client terminal, historical location information and a corresponding historical point in time.
8. A user identification information authentication apparatus, comprising:
the first acquisition unit is used for acquiring the characteristic information of the target user terminal;
a determining unit, configured to determine a target feature information set according to the feature information of the target user terminal;
the determining unit is further configured to determine a target crowd identity information database corresponding to the target feature information set in an identity information database;
the second acquisition unit is used for acquiring the identity information to be authenticated of the target user terminal;
the detection unit is used for detecting whether target identity information matched with the identity information to be authenticated exists in the target crowd identity information database or not;
the determining unit is further configured to determine that the identity information authentication is successful when the detecting unit detects that the target identity information matched with the identity information to be authenticated exists in the target crowd identity information database.
9. An electronic device, comprising: a processor, a memory; the computer-readable storage medium has stored therein instructions which, when run on a computer, cause the computer to perform the method of any one of claims 1 to 7.
10. A computer-readable storage medium having stored therein instructions which, when run on a computer, cause the computer to perform the method of any one of claims 1 to 7.
CN201910807869.XA 2019-08-29 2019-08-29 Method and device for quickly authenticating identity information Pending CN110659580A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910807869.XA CN110659580A (en) 2019-08-29 2019-08-29 Method and device for quickly authenticating identity information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910807869.XA CN110659580A (en) 2019-08-29 2019-08-29 Method and device for quickly authenticating identity information

Publications (1)

Publication Number Publication Date
CN110659580A true CN110659580A (en) 2020-01-07

Family

ID=69037903

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910807869.XA Pending CN110659580A (en) 2019-08-29 2019-08-29 Method and device for quickly authenticating identity information

Country Status (1)

Country Link
CN (1) CN110659580A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111523103A (en) * 2020-05-09 2020-08-11 支付宝(杭州)信息技术有限公司 User identity identification method and device and electronic equipment
CN115964004A (en) * 2022-12-19 2023-04-14 北京天域北斗文化科技集团有限公司 Map printing method and device, storage medium and server

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150143461A1 (en) * 2013-02-01 2015-05-21 Interman Corporation Identity confirmation method and identity confirmation system
CN104765994A (en) * 2015-04-17 2015-07-08 努比亚技术有限公司 User identity recognition method and device
CN106339428A (en) * 2016-08-16 2017-01-18 东方网力科技股份有限公司 Identity identification method and device for suspects based on large video data
CN108427871A (en) * 2018-01-30 2018-08-21 深圳奥比中光科技有限公司 3D faces rapid identity authentication method and device
CN108831157A (en) * 2018-07-27 2018-11-16 中山火炬高新企业孵化器有限公司 A kind of garden security protection based on intelligent robot is deployed to ensure effective monitoring and control of illegal activities management system
CN108875514A (en) * 2017-12-08 2018-11-23 北京旷视科技有限公司 Face authentication method and system and authenticating device and non-volatile memory medium
CN109086669A (en) * 2018-06-29 2018-12-25 汉王科技股份有限公司 Recognition of face auth method, device, electronic equipment
CN109241711A (en) * 2018-08-22 2019-01-18 平安科技(深圳)有限公司 User behavior recognition method and device based on prediction model
CN109697388A (en) * 2017-10-23 2019-04-30 北京京东尚科信息技术有限公司 Face identification method and device
CN109711847A (en) * 2018-12-26 2019-05-03 广州市巽腾信息科技有限公司 Method, apparatus, electronic equipment and the computer storage medium of near-field information certification
CN109740575A (en) * 2019-01-30 2019-05-10 北京一维大成科技有限公司 A kind of method, apparatus of authentication, computer-readable medium and equipment

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150143461A1 (en) * 2013-02-01 2015-05-21 Interman Corporation Identity confirmation method and identity confirmation system
CN104765994A (en) * 2015-04-17 2015-07-08 努比亚技术有限公司 User identity recognition method and device
CN106339428A (en) * 2016-08-16 2017-01-18 东方网力科技股份有限公司 Identity identification method and device for suspects based on large video data
CN109697388A (en) * 2017-10-23 2019-04-30 北京京东尚科信息技术有限公司 Face identification method and device
CN108875514A (en) * 2017-12-08 2018-11-23 北京旷视科技有限公司 Face authentication method and system and authenticating device and non-volatile memory medium
CN108427871A (en) * 2018-01-30 2018-08-21 深圳奥比中光科技有限公司 3D faces rapid identity authentication method and device
CN109086669A (en) * 2018-06-29 2018-12-25 汉王科技股份有限公司 Recognition of face auth method, device, electronic equipment
CN108831157A (en) * 2018-07-27 2018-11-16 中山火炬高新企业孵化器有限公司 A kind of garden security protection based on intelligent robot is deployed to ensure effective monitoring and control of illegal activities management system
CN109241711A (en) * 2018-08-22 2019-01-18 平安科技(深圳)有限公司 User behavior recognition method and device based on prediction model
CN109711847A (en) * 2018-12-26 2019-05-03 广州市巽腾信息科技有限公司 Method, apparatus, electronic equipment and the computer storage medium of near-field information certification
CN109740575A (en) * 2019-01-30 2019-05-10 北京一维大成科技有限公司 A kind of method, apparatus of authentication, computer-readable medium and equipment

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111523103A (en) * 2020-05-09 2020-08-11 支付宝(杭州)信息技术有限公司 User identity identification method and device and electronic equipment
CN115964004A (en) * 2022-12-19 2023-04-14 北京天域北斗文化科技集团有限公司 Map printing method and device, storage medium and server
CN115964004B (en) * 2022-12-19 2023-08-29 北京天域北斗文化科技集团有限公司 Map printing method and device, storage medium and server

Similar Documents

Publication Publication Date Title
CN109086669B (en) Face recognition identity verification method and device and electronic equipment
CN107590439B (en) Target person identification and tracking method and device based on monitoring video
CN112561684B (en) Financial fraud risk identification method, apparatus, computer device and storage medium
US9819677B2 (en) Supplementing biometric identification with device identification
CN110008903B (en) Face recognition method, device, system, storage medium and face payment method
CN107172590B (en) Mobile terminal and activity state information processing method and device based on same
CN109920174B (en) Book borrowing method and device, electronic equipment and storage medium
AU2015301819B2 (en) Biometric payment in transit systems
US9619634B2 (en) Identification system
CN111738736B (en) Method and system for data feedback
KR20140103046A (en) Object Tracing Method and Electronic Device supporting the same
CN110659580A (en) Method and device for quickly authenticating identity information
CN111954175A (en) Method for judging visiting of interest point and related device
CN116204871A (en) Abnormal behavior recognition method and device, electronic equipment and storage medium
KR20170132562A (en) System and method for providing service
CN107623715B (en) Identity information acquisition method and device
CN110942542A (en) Access control machine and control method and control equipment thereof
CN110852253A (en) Ladder control scene detection method and device and electronic equipment
CN112560700A (en) Information association method and device based on motion analysis and electronic equipment
CN115660001A (en) Near field communication card confirmation method and device, storage medium and electronic equipment
CN112560958A (en) Person reception method and device based on portrait recognition and electronic equipment
CN113286262A (en) Service providing method and apparatus, computer-readable storage medium, and electronic device
CN110969189B (en) Face detection method and device and electronic equipment
CN110879975B (en) Personnel flow detection method and device and electronic equipment
CN110781796B (en) Labeling method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200107